Systems Security Engineerother related Employment listings - Alexandria, VA at Geebo

Systems Security Engineer

Description System Security Engineer (PFPA-20-0505-F) Bowhead is seeking a System Security Engineer in the Arlington, VA area.
The Systems Security Engineer will provide full lifecycle systems engineering, in the design and implementation of the customer's Electronic Security Systems to include Access Control and Intrusion Detection Systems; Identity Management Systems; Closed Circuit and IP based Video Surveillance Systems; and Physical Security Information Management Systems.
Duties to include:
Provide IT Systems Engineering Support Services Develop project plans using Microsoft Project.
Develop IT architecture drawings using Microsoft Visio.
Recommend hardware software, storage, and subsequent software configurations to support the development and implementation of Electronic Security Systems.
Collaborate and liaison with Joint Service Provider for opening troubleshooting and change request tickets.
Collaborate and liaison with stakeholders to design and implement systems.
Prepare system migration plans from premise to the cloud.
Maintain systems in accordance with DISA, Cyber Command, and Joint Service Provider requirements Analyze and assess for opportunities to streamline and improve Project Management Project management duties will include performing such project management services and support for overall program management.
The applicant will provide inputs into the development of Business Needs/Case Analysis and Project Charters.
The applicant will also develop program documentation such as system diagrams, Ports, Protocols, Services forms, line drawings, technical data sheets, troubleshooting guides, business cases, and project charters.
The applicant will develop, track, and manage project schedules.
This person will also gather and analyze system requirements from customers and stakeholders.
They will assist in the development of Performance Work Statements, cost estimates, and market research.
They will lead or participate in working groups, Integrated Project Teams, and technical meetings.
The applicant will be responsible for developing briefings and white papers to report on program/project status, issues, activities, and proposed changes.
Engineering and Technical Analysis The applicant will conduct technical analysis of systems with respect to operational and design requirements, construction and implementation requirements, performance characteristics, and cost/benefit and sustainment requirements to advise the Government lead regarding the most effective approaches to support short and long-term goals.
This engineer will perform data analysis and make recommendations to improve system performance and reduce operational costs.
They will conduct analysis of alternatives to identify the best memory, storage, compute, operating systems, and make and model of compatible hardware.
The applicant will assess commercially-available-off-the-shelf (COTS) systems and emerging technologies, produce technical reports on system feasibility, reliability, and cost effectives.
They will be able to architect systems encompassing firewalls, F5 proxies, Public and Private DMZs, and through the DoD security stacks.
They will also be able to design and recommend solutions to systems using Microsoft Azure cloud.
The applicant will review, develop, improve, and implement model and simulation tools.
They will provide design and drawings as needed to document system installations and infrastructure enhancements required to support program objectives.
Change and Quality Management This engineer will develop, implement, and comply with configuration and change control management plans.
They will develop and implement quality assurance standards for electronic security systems and mission applications.
The applicant will develop and maintain hardware and software configuration management and ensure PFPA quality assurance standards are achieved.
They will also develop, review, and maintain Interface Control Documents.
System Installation, Configuration, and Transition The Applicant will oversee and/or perform system/sensor/device installation, troubleshooting, and repairs, and install and configure software.
They will collaborate directly with Original Equipment Manufacturers to configure applications, for system integration, updates, testing, troubleshooting, and to resolve anomalous system performance and sensor network issues.
They will, upon a successful and stakeholder approved installation, prepare documentation.
Requirements Required Baccalaureate degree in IT Systems, or related discipline 10
years of specialized experience in systems engineering or related field 5
years of specialized experience in IT Project Management Knowledge of Cybersecurity and its related disciplines Preferred skills and/or certifications:
Cybersecurity Information Systems Security Professional (CISSP) Information Systems Security Officer (ISSO) Experience working closely with Physical Security Subject Matter Experts (SME) doing physical security installs and upgrades SECURITY CLEARANCE REQUIRED:
Must be able to maintain a security clearance at the Secret level.
US Citizenship is a requirement for Secret clearance at this location.
Applicants may be subject to a pre-employment drug & alcohol screening and/or random drug screen, and must follow UIC's Non-DOT Drug & Alcohol Testing Program requirements.
If the position requires, an applicant must pass a pre-employment criminal background history check.
All post-secondary education listed on the applicant's resume/application may be subject to verification.
Where driving may be required or where a rental car must be obtained for business travel purposes, applicants must have a valid driver license for this position and will be subject to verification.
In addition, the applicant must pass an in-house, online, driving course to be authorized to drive for company purposes.
UIC is an equal opportunity employer.
We evaluate qualified applicants without regard to race, age, color, religion, sex, national origin, disability, veteran status, and other protected characteristics EOE/AA/M/F/D/V.
In furtherance, pursuant to The Alaska Native Claims Settlement Act 43 USC Sec.
1601 et seq.
, and federal contractual requirements, UIC and its subsidiaries may legally grant certain preference in employment opportunities to UIC Shareholders and their Descendants, based on the provisions contained within The Alaska Native Claims Settlement Act.
All candidates must apply online at , and submit a completed application for all positions they wish to be considered.
Once the employment application has been completed and submitted, any changes to the application after submission may not be reviewed.
Please contact a UIC HR Recruiter if you have made a significant change to your application.
In accordance with the Americans with Disabilities Act of 1990 (ADA), persons unable to complete an online application should contact UIC Human Resources for assistance ( ).
UIC Government Services (UICGS / Bowhead) provides innovative business solutions to federal and commercial customers in the areas of engineering, maintenance services, information technology, program support, logistics/base support, and procurement.
Collectively, the fast-growing Bowhead Family of Companies offers a breadth of services which are performed with a focus on quality results.
Headquartered in Springfield, VA, we are a fast-growing, multi-million-dollar corporation recognized as one of the top 25 8(a) companies for government contracting.
Link to Apply:
.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.